Sciweavers

15 search results - page 2 / 3
» Database System Architecture - A Walk Through Time: From Cen...
Sort
View
ICDCS
2002
IEEE
13 years 10 months ago
A Fully Distributed Framework for Cost-Sensitive Data Mining
Data mining systems aim to discover patterns and extract useful information from facts recorded in databases. A widely adopted approach is to apply machine learning algorithms to ...
Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. S...
VLDB
1999
ACM
145views Database» more  VLDB 1999»
13 years 9 months ago
DBMSs on a Modern Processor: Where Does Time Go?
Recent high-performance processors employ sophisticated techniques to overlap and simultaneously execute multiple computation and memory operations. Intuitively, these techniques ...
Anastassia Ailamaki, David J. DeWitt, Mark D. Hill...
WWW
2004
ACM
14 years 5 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
ICMCS
2007
IEEE
163views Multimedia» more  ICMCS 2007»
13 years 11 months ago
An Augmented Reality Interface for Mobile Information Retrieval
Recent years have seen growing interest in mobile augmented reality. The ability to retrieve information and display it as virtual content overlaid on top of an image of the real ...
Jonathan Mooser, Lu Wang, Suya You, Ulrich Neumann
PCI
2005
Springer
13 years 10 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...